List of questions
Related questions
Question 194 - SY0-701 discussion
Which of the following is most likely to be deployed to obtain and analyze attacker activity and techniques?
A.
Firewall
B.
IDS
C.
Honeypot
D.
Layer 3 switch
Your answer:
0 comments
Sorted by
Leave a comment first